AgenticAISensitiveInfoDisclosurePrompt Injection, RAG,Vector Database, DeepfakeAttacks, Agentic AI,Excessive Agency, MCP,ISO/IEC 42001, AI Firewall,Sensitive Info Disclosure,AI Runtime Security,Workload Identity,Confidential Computing, AISecurity PostureManagement.DataPrivacyISO/IEC42001ZeroTrustMCPEncryptionMachineLearningConfidentialComputingAIFirewallAI SecurityPostureManagementExcessiveAgencyPromptInjectionNeuralNetworksCyberResilienceVectorDatabaseComplianceWorkloadIdentityCloudSecurityThreatHuntingLLMHallucinationAIRuntimeSecurityRAGDeepfakeAttacksAgenticAISensitiveInfoDisclosurePrompt Injection, RAG,Vector Database, DeepfakeAttacks, Agentic AI,Excessive Agency, MCP,ISO/IEC 42001, AI Firewall,Sensitive Info Disclosure,AI Runtime Security,Workload Identity,Confidential Computing, AISecurity PostureManagement.DataPrivacyISO/IEC42001ZeroTrustMCPEncryptionMachineLearningConfidentialComputingAIFirewallAI SecurityPostureManagementExcessiveAgencyPromptInjectionNeuralNetworksCyberResilienceVectorDatabaseComplianceWorkloadIdentityCloudSecurityThreatHuntingLLMHallucinationAIRuntimeSecurityRAGDeepfakeAttacks

THALES BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Agentic AI
  2. Sensitive Info Disclosure
  3. Prompt Injection, RAG, Vector Database, Deepfake Attacks, Agentic AI, Excessive Agency, MCP, ISO/IEC 42001, AI Firewall, Sensitive Info Disclosure, AI Runtime Security, Workload Identity, Confidential Computing, AI Security Posture Management.
  4. Data Privacy
  5. ISO/IEC 42001
  6. Zero Trust
  7. MCP
  8. Encryption
  9. Machine Learning
  10. Confidential Computing
  11. AI Firewall
  12. AI Security Posture Management
  13. Excessive Agency
  14. Prompt Injection
  15. Neural Networks
  16. Cyber Resilience
  17. Vector Database
  18. Compliance
  19. Workload Identity
  20. Cloud Security
  21. Threat Hunting
  22. LLM Hallucination
  23. AI Runtime Security
  24. RAG
  25. Deepfake Attacks